2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International 2019
DOI: 10.1109/trustcom/bigdatase.2019.00076
|View full text |Cite
|
Sign up to set email alerts
|

PIT: A Probe Into Internet of Things by Comprehensive Security Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…SAST is an invaluable way of assessing the security of IoT but not the only one needed as it is meant to be complementary (but necessary) to the more traditional blackbox techniques used. Black-box methods used for vulnerability detection in IoT systems include, among others, fuzzing, taint-analysis, symbolic execution, homology analysis, and penetration testing [29][30][31][32][33]. In the remainder of this section, we discuss some of the latest scientific work conducted on these methods.…”
Section: Assessing the Security Of Iot Softwarementioning
confidence: 99%
“…SAST is an invaluable way of assessing the security of IoT but not the only one needed as it is meant to be complementary (but necessary) to the more traditional blackbox techniques used. Black-box methods used for vulnerability detection in IoT systems include, among others, fuzzing, taint-analysis, symbolic execution, homology analysis, and penetration testing [29][30][31][32][33]. In the remainder of this section, we discuss some of the latest scientific work conducted on these methods.…”
Section: Assessing the Security Of Iot Softwarementioning
confidence: 99%
“…Most vulnerabilities can be traced to insecure coding practices by the software developers [21]. While much work has been published on IoT vulnerability analysis, most of it employs black-box approaches like penetration testing and fuzzing [22][23][24][25][26]. Little work has been published focusing on white-box testing of open-source software running on IoT devices, by examining the underlying source code and the vulnerabilities stemming from it.…”
Section: Introductionmentioning
confidence: 99%